The eBook copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Written by leading IT security educators, this fully updated Lab Manual supplementsPrinciples of Computer Security: CompTIA Security+ and Beyond, Second EditionPrinciples of Computer Security Lab Manual, Second Edition, contains more than 30 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to CompTIA Security+ certification exam objectives, ensuring clear correspondence toPrinciples of Computer Security: CompTIA Security+ and Beyond, Second Edition.The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons aid you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the Key Term Quiz helps to build vocabulary.Principles of Computer Security Lab Manual, Second Edition, features: New, more dynamic design and a larger trim size The real-world, hands-on practice you need to pass the certification exam and succeed on the job Lab solutions on the textbook OLC (Online Learning Center)All-inclusive coverage: Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless Security; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy
Table of Contents
Part I: Networking Basics: How Do Networks Work? Chapter 1: Workstation Network Conﬁguration and Connectivity Chapter 2: TCP/UDP Basics Chapter 3: Network Applications Part II: Vulnerabilities and Threats - How Can Systems Be Compromised? Chapter 4: Scanning and Enumerating the Network for Targets Chapter 5: Attacks—Web Server, E-mail, DOS, and Trojan Attacks Chapter 6: Escalating Privilege— Sniffing, Keylogging, Password-Cracking Attacks Part III: Prevention: How Do We Prevent Harm to Systems? Chapter 7: Hardening the Host Computer Chapter 8: Securing Network Communications Part IV: Detection and Response: How Do We Detect and Respond to Attacks? Chapter 9: Preparing for and Detecting Attacks Chapter 10: Digital Forensics